OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/signin/signin_manager.h" | 5 #include "chrome/browser/signin/signin_manager.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
9 #include "base/compiler_specific.h" | 9 #include "base/compiler_specific.h" |
10 #include "base/stringprintf.h" | 10 #include "base/stringprintf.h" |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
54 google_login_success_.ListenFor( | 54 google_login_success_.ListenFor( |
55 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL, | 55 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL, |
56 content::Source<Profile>(profile_.get())); | 56 content::Source<Profile>(profile_.get())); |
57 google_login_failure_.ListenFor(chrome::NOTIFICATION_GOOGLE_SIGNIN_FAILED, | 57 google_login_failure_.ListenFor(chrome::NOTIFICATION_GOOGLE_SIGNIN_FAILED, |
58 content::Source<Profile>(profile_.get())); | 58 content::Source<Profile>(profile_.get())); |
59 } | 59 } |
60 | 60 |
61 virtual void TearDown() OVERRIDE { | 61 virtual void TearDown() OVERRIDE { |
62 // Destroy the SigninManager here, because it relies on profile_ which is | 62 // Destroy the SigninManager here, because it relies on profile_ which is |
63 // freed in the base class. | 63 // freed in the base class. |
| 64 manager_->Shutdown(); |
64 manager_.reset(NULL); | 65 manager_.reset(NULL); |
65 TestingBrowserProcess::GetGlobal()->SetLocalState(NULL); | 66 TestingBrowserProcess::GetGlobal()->SetLocalState(NULL); |
66 prefs_.reset(NULL); | 67 prefs_.reset(NULL); |
67 TokenServiceTestHarness::TearDown(); | 68 TokenServiceTestHarness::TearDown(); |
68 } | 69 } |
69 | 70 |
70 void SetupFetcherAndComplete(const std::string& url, | 71 void SetupFetcherAndComplete(const std::string& url, |
71 int response_code, | 72 int response_code, |
72 const net::ResponseCookies& cookies, | 73 const net::ResponseCookies& cookies, |
73 const std::string& response_string) { | 74 const std::string& response_string) { |
(...skipping 127 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
201 | 202 |
202 SimulateValidResponseClientLogin(true); | 203 SimulateValidResponseClientLogin(true); |
203 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); | 204 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
204 EXPECT_TRUE(profile_->GetPrefs()->GetBoolean(prefs::kIsGooglePlusUser)); | 205 EXPECT_TRUE(profile_->GetPrefs()->GetBoolean(prefs::kIsGooglePlusUser)); |
205 | 206 |
206 // Should go into token service and stop. | 207 // Should go into token service and stop. |
207 EXPECT_EQ(1U, google_login_success_.size()); | 208 EXPECT_EQ(1U, google_login_success_.size()); |
208 EXPECT_EQ(0U, google_login_failure_.size()); | 209 EXPECT_EQ(0U, google_login_failure_.size()); |
209 | 210 |
210 // Should persist across resets. | 211 // Should persist across resets. |
| 212 manager_->Shutdown(); |
211 manager_.reset(new SigninManager()); | 213 manager_.reset(new SigninManager()); |
212 manager_->Initialize(profile_.get()); | 214 manager_->Initialize(profile_.get()); |
213 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 215 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
214 } | 216 } |
215 | 217 |
216 TEST_F(SigninManagerTest, Prohibited) { | 218 TEST_F(SigninManagerTest, Prohibited) { |
217 g_browser_process->local_state()->SetString( | 219 g_browser_process->local_state()->SetString( |
218 prefs::kGoogleServicesUsernamePattern, ".*@google.com"); | 220 prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
219 manager_->Initialize(profile_.get()); | 221 manager_->Initialize(profile_.get()); |
220 EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); | 222 EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); |
(...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
270 | 272 |
271 // This is flow, the oauth2 credentials should already be available in | 273 // This is flow, the oauth2 credentials should already be available in |
272 // the token service. | 274 // the token service. |
273 EXPECT_TRUE(service_->HasOAuthLoginToken()); | 275 EXPECT_TRUE(service_->HasOAuthLoginToken()); |
274 | 276 |
275 // Should go into token service and stop. | 277 // Should go into token service and stop. |
276 EXPECT_EQ(1U, google_login_success_.size()); | 278 EXPECT_EQ(1U, google_login_success_.size()); |
277 EXPECT_EQ(0U, google_login_failure_.size()); | 279 EXPECT_EQ(0U, google_login_failure_.size()); |
278 | 280 |
279 // Should persist across resets. | 281 // Should persist across resets. |
| 282 manager_->Shutdown(); |
280 manager_.reset(new SigninManager()); | 283 manager_.reset(new SigninManager()); |
281 manager_->Initialize(profile_.get()); | 284 manager_->Initialize(profile_.get()); |
282 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 285 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
283 } | 286 } |
284 | 287 |
285 TEST_F(SigninManagerTest, SignInWithCredentialsWrongEmail) { | 288 TEST_F(SigninManagerTest, SignInWithCredentialsWrongEmail) { |
286 manager_->Initialize(profile_.get()); | 289 manager_->Initialize(profile_.get()); |
287 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 290 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
288 | 291 |
289 // If the email address used to start the sign in does not match the | 292 // If the email address used to start the sign in does not match the |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
333 // Now clear the in memory data. | 336 // Now clear the in memory data. |
334 manager_->ClearTransientSigninData(); | 337 manager_->ClearTransientSigninData(); |
335 EXPECT_TRUE(manager_->last_result_.data.empty()); | 338 EXPECT_TRUE(manager_->last_result_.data.empty()); |
336 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); | 339 EXPECT_FALSE(manager_->GetAuthenticatedUsername().empty()); |
337 | 340 |
338 // Ensure preferences are not modified. | 341 // Ensure preferences are not modified. |
339 EXPECT_FALSE( | 342 EXPECT_FALSE( |
340 profile_->GetPrefs()->GetString(prefs::kGoogleServicesUsername).empty()); | 343 profile_->GetPrefs()->GetString(prefs::kGoogleServicesUsername).empty()); |
341 | 344 |
342 // On reset it should be regenerated. | 345 // On reset it should be regenerated. |
| 346 manager_->Shutdown(); |
343 manager_.reset(new SigninManager()); | 347 manager_.reset(new SigninManager()); |
344 manager_->Initialize(profile_.get()); | 348 manager_->Initialize(profile_.get()); |
345 | 349 |
346 // Now make sure we have the right user name. | 350 // Now make sure we have the right user name. |
347 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 351 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
348 } | 352 } |
349 | 353 |
350 TEST_F(SigninManagerTest, SignOutClientLogin) { | 354 TEST_F(SigninManagerTest, SignOutClientLogin) { |
351 manager_->Initialize(profile_.get()); | 355 manager_->Initialize(profile_.get()); |
352 manager_->StartSignIn("username", "password", "", ""); | 356 manager_->StartSignIn("username", "password", "", ""); |
353 SimulateValidResponseClientLogin(false); | 357 SimulateValidResponseClientLogin(false); |
354 manager_->OnClientLoginSuccess(credentials_); | 358 manager_->OnClientLoginSuccess(credentials_); |
355 | 359 |
356 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 360 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
357 manager_->SignOut(); | 361 manager_->SignOut(); |
358 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 362 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
359 EXPECT_FALSE(profile_->GetPrefs()->GetBoolean(prefs::kIsGooglePlusUser)); | 363 EXPECT_FALSE(profile_->GetPrefs()->GetBoolean(prefs::kIsGooglePlusUser)); |
360 // Should not be persisted anymore | 364 // Should not be persisted anymore |
| 365 manager_->Shutdown(); |
361 manager_.reset(new SigninManager()); | 366 manager_.reset(new SigninManager()); |
362 manager_->Initialize(profile_.get()); | 367 manager_->Initialize(profile_.get()); |
363 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 368 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
364 } | 369 } |
365 | 370 |
366 TEST_F(SigninManagerTest, SignInFailureClientLogin) { | 371 TEST_F(SigninManagerTest, SignInFailureClientLogin) { |
367 manager_->Initialize(profile_.get()); | 372 manager_->Initialize(profile_.get()); |
368 manager_->StartSignIn("username", "password", "", ""); | 373 manager_->StartSignIn("username", "password", "", ""); |
369 GoogleServiceAuthError error(GoogleServiceAuthError::REQUEST_CANCELED); | 374 GoogleServiceAuthError error(GoogleServiceAuthError::REQUEST_CANCELED); |
370 manager_->OnClientLoginFailure(error); | 375 manager_->OnClientLoginFailure(error); |
371 | 376 |
372 EXPECT_EQ(0U, google_login_success_.size()); | 377 EXPECT_EQ(0U, google_login_success_.size()); |
373 EXPECT_EQ(1U, google_login_failure_.size()); | 378 EXPECT_EQ(1U, google_login_failure_.size()); |
374 | 379 |
375 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 380 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
376 | 381 |
377 // Should not be persisted | 382 // Should not be persisted |
| 383 manager_->Shutdown(); |
378 manager_.reset(new SigninManager()); | 384 manager_.reset(new SigninManager()); |
379 manager_->Initialize(profile_.get()); | 385 manager_->Initialize(profile_.get()); |
380 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); | 386 EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |
381 } | 387 } |
382 | 388 |
383 TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { | 389 TEST_F(SigninManagerTest, ProvideSecondFactorSuccess) { |
384 manager_->Initialize(profile_.get()); | 390 manager_->Initialize(profile_.get()); |
385 manager_->StartSignIn("username", "password", "", ""); | 391 manager_->StartSignIn("username", "password", "", ""); |
386 GoogleServiceAuthError error(GoogleServiceAuthError::TWO_FACTOR); | 392 GoogleServiceAuthError error(GoogleServiceAuthError::TWO_FACTOR); |
387 manager_->OnClientLoginFailure(error); | 393 manager_->OnClientLoginFailure(error); |
(...skipping 96 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
484 | 490 |
485 manager_->ProvideOAuthChallengeResponse( | 491 manager_->ProvideOAuthChallengeResponse( |
486 GoogleServiceAuthError::CAPTCHA_REQUIRED, "token", "solution"); | 492 GoogleServiceAuthError::CAPTCHA_REQUIRED, "token", "solution"); |
487 | 493 |
488 SimulateProvideOAuthChallengeResponseValid(); | 494 SimulateProvideOAuthChallengeResponseValid(); |
489 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); | 495 EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
490 | 496 |
491 EXPECT_EQ(1U, google_login_success_.size()); | 497 EXPECT_EQ(1U, google_login_success_.size()); |
492 EXPECT_EQ(1U, google_login_failure_.size()); | 498 EXPECT_EQ(1U, google_login_failure_.size()); |
493 } | 499 } |
OLD | NEW |